Categories: NewsTech

Warning: Your Windows credentials on Zoom are vulnerable to attackers

As organisations around the world revert to remote working setups, video conferencing app Zoom has certainly seen a rise in popularity. But this popularity is certainly a double-edged sword: privacy issues have come under the spotlight, while the company is the subject of a class action lawsuit in the U.S. for its perceived handling of users’ data.

Now, a report from BleepingComputer has revealed a new problem for Zoom users. A security bug means that users of Zoom’s Windows client could have their Windows login credentials stolen by malicious parties, with users calling for the vulnerability to be patched ASAP.

How does it work?

While the Zoom platform is primarily used for video conferencing, users also communicate with each other via text messages. These text messages, of course, often contain URLs which are converted into hyperlinks on the chat interface so that participants in a chat can then open the links in their browser.

SOURCE: BleepingComputer

However, the issue here is that Zoom also converts Windows networking UNC paths into clickable links (UNC [Universal Naming Convention] is a path to remote servers/printers/network resources). When these links are clicked, Windows connects to the remote server—crucially, Windows will also send over login credentials while doing this.

These credentials are then easily accessible by malicious parties, with BleepingComputer saying that programs can be used to decrypt the credentials—including passwords—“quickly”. To make a bad situation worse, the vulnerability can also be used to “launch programs” whenever these links are clicked.

SOURCE: Malay Mail

How do I protect myself?

Hopefully, Zoom will issue a patch to fix the bug, although the team there certainly have their hands full. Failing that, you can also tweak your Windows settings so that your credentials are not sent when UNC links are clicked.

On Windows 10, open the Group Policy Editor, and head over to the following path: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options > Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers, and set to Deny All.

However, the Group Policy Editor isn’t available on the Home Edition for Windows 10 by default. This means that Home users will need to install the editor before proceeding.

Or, y’know, you could always find another conferencing app to use. Zoom has come under some serious criticism of late, with issues pertaining to its handling of user data, security, and privacy matters. To find out more about Zoom’s problems, read this story.

[ SOURCE ]

Related reading

Recent Posts

JomCharge x DBKL turn on EV chargers at McDonald’s Sri Petaling

JomCharge x DBKL street-level EV charger deployment continues and the latest location is in Sri…

23 hours ago

Can you and your family enjoy a 100% electric drive without ever plugging in?

This post is brought to you by Nissan. For many Malaysian families, the idea of…

2 days ago

Gentari’s largest EV Charging Hub in Penang, 540kW total capacity with 6 bays at Bayan Baru

Besides deploying more DC Chargers in Penang Island in partnership with MBPP, Gentari has just…

2 days ago

BMW 7 Series gets Neue Klasse upgrade. New i7 now offers over 700km range and 250kW DC fast charging

BMW has officially revealed the updated 7th generation BMW 7 Series (G70), and this isn’t…

2 days ago

Oppo Find X9s goes official in Malaysia: Triple 50MP Hasselblad cameras, Dimensity 9500s, 6.59″ AMOLED, priced at RM3,899

Aside from the big boss Find X9 Ultra, Oppo Malaysia has also introduced another member…

2 days ago

Honor 600 series launched in Malaysia: Snapdragon 8 Elite, 200MP camera, 7,000mAh battery, priced from RM2,599

The Honor 600 and Honor 600 Pro have finally made their launch in Malaysia, making…

2 days ago

This website uses cookies.